Resources | Fortra

Resources

On-Demand Webinar

Wie Sie die Sicherheit und Effizienz Ihrer Dateiübertragungen verbessern können

Obwohl es EDI und Verschlüsselung schon seit Jahrzehnten gibt, geht es bei der Übertragung sensibler Daten vor allem um Geschwindigkeit, Umfang und Sicherheit. Nehmen Sie an diesem Webinar teil und erfahren Sie mehr über die folgenden Punkte: - Die besten Methoden für den internen Datenaustausch - Welche Daten am wertvollsten sind - Was macht Dateiübertragungen so unsicher? - Häufige Fallen bei...
On-Demand Webinar

I Have All Object Authority and I’m Not Afraid to Use It!

In this webinar, security expert and IBM Champion Robin Tatam explores best practices for All Object authority and strategies for correcting this vulnerability.
On-Demand Webinar

IBM i in 2022: It’s Not Just AS/400

Discover our experts' unique perspective on the direction of IBM i and how to optimize your strategy surrounding it.
On-Demand Webinar

The Evolution of IBM i in the Data Center

AS/400, iSeries, IBM Power Systems—by any name, IBM i has stood the test of time. This proven technology continues to serve the needs of changing data centers around the world, but can its secrets of past success teach us what to expect next?
On-Demand Webinar

Promoting the Future of IBM i in Your Business

Yes "i" can! Get tips for selling your peers and executives on the low total cost of ownership of IBM i and enhance your organization’s strong heritage on the platform.
On-Demand Webinar

Expert Tips for Securing AIX Systems

Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier. One of the most serious mistakes is failing to create a well-defined security policy. A written statement of how your...
On-Demand Webinar

How to Control Your Data and Stay Compliant with Robotic Process Automation

Data security is a top concern for modern businesses when choosing any new software. It’s critical to ensure your data will be kept safe and within compliance regulations when choosing vendors. Automate is a robotic process automation (RPA) solution that lets you automate your most repetitive tasks to make your life easier and more efficient without leaving you vulnerable. Watch our on-demand...
On-Demand Webinar

Meeting GDPR Compliance with Robotic Process Automation

The GDPR impacts any organization that collects and processes the data of European residents. If you’re affected, now’s the time to kick compliance into motion! The GDPR takes effect on May 25, 2018. Organizations worldwide need to prepare for compliance—or face severe fines and penalties if regulation requirements aren’t achieved. Listen to this webinar to boost your knowledge of the GDPR and...
On-Demand Webinar

Expert Tips for Avoiding AIX Security Mistakes

Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier. One of the most serious mistakes is failing to create a well-defined security policy. A written statement of how your...
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?